CN108255644B - File system recovery method and device - Google Patents

File system recovery method and device Download PDF

Info

Publication number
CN108255644B
CN108255644B CN201711472107.6A CN201711472107A CN108255644B CN 108255644 B CN108255644 B CN 108255644B CN 201711472107 A CN201711472107 A CN 201711472107A CN 108255644 B CN108255644 B CN 108255644B
Authority
CN
China
Prior art keywords
hash value
file system
file
sector
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711472107.6A
Other languages
Chinese (zh)
Other versions
CN108255644A (en
Inventor
贾昌伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Information Technology Group Co ltd
Original Assignee
Yuanxin Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanxin Technology filed Critical Yuanxin Technology
Priority to CN201711472107.6A priority Critical patent/CN108255644B/en
Publication of CN108255644A publication Critical patent/CN108255644A/en
Application granted granted Critical
Publication of CN108255644B publication Critical patent/CN108255644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating

Abstract

The application discloses a file system recovery method and a device, wherein the method comprises the following steps: in response to a file system corruption, determining a block number of the corrupted portion; detecting whether the current environment is safe; responding to the current environment safety, and directly repairing the damaged file system; and responding to the current environment being unsafe, restarting the system to enter a BootLoader mode, and then repairing the damaged file system. According to the invention, when the file system is damaged, different repair strategies are adopted for automatic repair according to the environment safety condition, so that the safety of the smart phone and the embedded equipment is greatly enhanced, the maintainability of the equipment is improved, and the user experience is improved.

Description

File system recovery method and device
Technical Field
The present application relates to the field of electrical digital data processing, and in particular, to a file system recovery method and apparatus.
Background
Android proposes a dm-visibility method from version 4.4 to protect a file system. The dm-verity is based on the kernel's Device mapper framework. The Device mapper is a mapping framework mechanism from a logical Device to a physical Device provided in a kernel, and under the mapping framework mechanism, a user can conveniently make a management strategy for realizing storage resources according to own requirements. dm-verify uses a hash tree to describe the entire system image. This mechanism allows system partitions to verify on read and write, rather than verifying the entire system image at once. When the check hash value is inconsistent, it indicates that some blocks of the file system are destroyed, and an IO error is returned. At this point, some of the file system functionality will be unavailable.
Disclosure of Invention
In order to overcome the defects in the prior art, the technical problem to be solved by the invention is to provide a file system recovery method and device, which can repair the damaged file system area in time, reduce the influence on the use of a user and improve the user experience.
In order to solve the above technical problem, the file system recovery method of the present invention includes:
in response to a file system corruption, determining a block number of the corrupted portion;
detecting whether the current environment is safe;
responding to the current environment safety, and directly repairing the damaged file system; and
in response to the current environment being unsafe, the system reboots into BootLoader mode and then performs a repair of the damaged file system.
As an improvement of the method of the present invention, the directly performing the repair of the damaged file system in response to the current environment security comprises: acquiring a binary file for repairing according to the block number; calculating the hash value of the obtained binary file; comparing the calculated hash value with the corresponding hash value of the factory state; responding to the correct calculated hash value, and calculating the sector corresponding to the block number; writing the obtained binary file to the calculated sector.
As another improvement of the method of the present invention, the restarting the system to enter BootLoader mode in response to the current environment being unsafe and then performing the repair of the damaged file system includes: restarting the system to enter a BootLoader mode; acquiring a binary file for repairing according to the block number; calculating the hash value of the obtained binary file; comparing the calculated hash value with the corresponding hash value of the factory state; responding to the correct calculated hash value, and calculating the sector corresponding to the block number; writing the obtained binary file to the calculated sector; calculating hash values of all blocks of the file system; checking whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state; and in response to the fact that the hash value of any block is inconsistent with the corresponding hash value of the factory state, performing the same repairing treatment on the block as the damaged block.
As a further improvement of the method of the present invention, the binary file for repair is obtained from a web server, a local hidden backup area, or a local read-only area.
As a further improvement of the method according to the invention, the locally hidden backup area is hidden by corresponding the start sector of the area of the device where the backup file system is not stored to sector 0 of the file system.
To solve the above technical problem, the file system recovery apparatus of the present invention includes:
a block number determination module for determining a block number of the corrupted portion in response to the file system corruption;
the environment safety detection module is used for detecting whether the current environment is safe or not;
the first repair module is used for responding to the current environment safety and directly repairing the damaged file system; and
and the second repair module is used for responding to the current environment insecurity, restarting the system to enter a BootLoader mode, and then repairing the damaged file system.
As an improvement of the apparatus of the present invention, the first repair module includes: the file acquisition submodule is used for acquiring a binary file for repairing according to the block number; the first hash value operator module is used for calculating the hash value of the acquired binary file; the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state; the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value; and the file writing submodule is used for writing the acquired binary file into the calculated sector.
As another improvement of the apparatus of the present invention, the second repair module includes: the restarting submodule is used for restarting the system to enter a BootLoader mode; the file acquisition submodule is used for acquiring a binary file for repairing according to the block number; the first hash value operator module is used for calculating the hash value of the acquired binary file; the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state; the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value; a write file submodule for writing the acquired binary file to the calculated sector; the second hash value operator module is used for calculating the hash value of each block of the file system; the second comparison submodule is used for checking whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state; and the circular repair submodule is used for responding to the fact that the hash value of any block is inconsistent with the corresponding hash value of the factory state, and performing repair processing on the block as same as the damaged block.
To solve the above technical problem, the tangible computer readable medium of the present invention includes computer program code for executing the file system recovery method of the present invention.
To solve the above technical problem, the present invention provides an apparatus, comprising at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least some of the steps of the file system recovery method of the present invention.
According to the invention, when the dm-context finds that the file system is damaged, different repair strategies are adopted for timely repairing according to the environment security condition, so that the root file system can be automatically repaired when damaged, the safety of the smart phone and the embedded equipment is greatly enhanced, the maintainability of the equipment is improved, and the user experience is improved.
Other features and advantages of the present invention will become more apparent from the detailed description of the embodiments of the present invention when taken in conjunction with the accompanying drawings.
Drawings
FIG. 1 is a flow chart of an embodiment of a method according to the present invention.
FIG. 2 is a schematic structural diagram of an embodiment of the apparatus according to the present invention.
For the sake of clarity, the figures are schematic and simplified drawings, which only show details which are necessary for understanding the invention and other details are omitted.
Detailed Description
Embodiments and examples of the present invention will be described in detail below with reference to the accompanying drawings.
The scope of applicability of the present invention will become apparent from the detailed description given hereinafter. It should be understood, however, that the detailed description and the specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only.
FIG. 1 illustrates a flow diagram of one embodiment of a file system recovery method in accordance with the present invention.
In step S102, in response to dm-verity finding a file system corruption, dm-verity will give a corrupted block id (block number).
In step S104, whether the current environment of the system is safe is detected by the security module. If the security module determines that the system environment is secure, the process proceeds to step S110. Otherwise, if the security module determines that the system environment is not secure, the process proceeds to step S150. The detection items of the security module can be determined as required. Generally, the security module detects authenticity of the base station, security of wifi, and the like, for example, whether an arp attack, DNS tampering, unencrypted, and the like exist.
In step S110, the damaged block id is sent to the web server, and the web server returns the content to be downloaded to the client according to the block id, where the format is a binary file.
In step S112, the client calculates a hash value of the downloaded binary file.
In step S114, the calculated hash value is compared with a corresponding hash value of the factory state. If the calculated hash value is correct, the process proceeds to step S116. Otherwise, if the calculated hash value is incorrect, it indicates that an error occurs in the downloading process, and the download needs to be performed again, and the process returns to step S110.
In step S116, the sector corresponding to the block id is calculated by the file system of the kernel. The corresponding sector when reading is the sector to be written when writing.
In step S118, the downloaded binary file is written to the corresponding sector of the device using the write function. Therefore, the damaged root file system can be repaired in time, and the use of a user is not influenced.
In step S150, in response to that the current environment of the system is not safe, the system is restarted to enter the BootLoader mode.
In step S152, the damaged block id is sent to the web server, and the web server returns the content to be downloaded to the client according to the block id, where the format is a binary file.
In step S154, the client calculates a hash value of the downloaded binary file.
In step S156, the calculated hash value is compared with the corresponding hash value of the factory state. If the calculated hash value is correct, the process proceeds to step S158. Otherwise, if the calculated hash value is not correct, it indicates that an error occurs in the downloading process, and the download needs to be performed again, and the process returns to step S152.
In step S158, the sector corresponding to the block id is calculated.
In step S160, the write function of bootloader is called to write the downloaded binary file into the corresponding sector of the device.
In step S162, the hash value of each block is recalculated under bootloader.
In step S164, it is checked whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state. If the hash value of any block is inconsistent with the corresponding hash value of the factory state, the process returns to step S152, and the inconsistent blocks are repaired until all blocks are completely correct. And if the hash value of each block is consistent with the corresponding hash value of the factory state, ending the processing.
In the above embodiment, the advantage of using the network server to repair the root file system is that a large amount of storage space is saved, so that the space on the device can be better utilized on the space used by the user.
However, in other embodiments, the repair of the corrupted block may also be performed using a file system that is backed up locally by the client. In this case, it is important to ensure the security of the backed-up file system. In an embodiment, the file system backup area may be hidden. An interface is arranged between a file system and a drive layer, a 0 sector of a device is butted with a 0 sector considered by the file system, if an x sector of the device is corresponding to the 0 sector of the file system, the x sector of the device is considered by the file system to be the 0 sector, and therefore the purpose of hiding some sectors is achieved. After the file system backup area is hidden, the application cannot see the contents of the partition. That is, the content of the partition cannot be seen no matter what authority the application has, thereby ensuring the security of the file system backup area. But may leave itself with a back door in order to access the backed up file system at the time of repair. When the environment is safe and needs to be repaired, the back door is opened, and the parameters are transferred to the kernel by using the proc or sys file system to copy corresponding data, so that the binary file for repairing can be obtained. The method has the advantages that the repair can be completed under the condition that the user cannot sense the repair, and the user experience is improved. If the system environment is not safe, the system is restarted to enter a bootloader mode, another kernel is used, the kernel does not do the work of hiding the partition, and the backup partition can be seen after the system is up and the binary file copied for repair is directly repaired.
In other embodiments, the local backup area may not be hidden, and is set to be read-only in the user space, and protected by selinux and root weight distribution correlation mechanism. And when needed, mounting in a read-only mode, and covering the modified blocks or files or the whole partition for repairing.
Fig. 2 shows a schematic structural diagram of an embodiment of the file system recovery apparatus according to the present invention. The apparatus of this embodiment comprises: a block number determination module 202 for determining a block number of the corrupted portion in response to the file system corruption; an environment security detection module 204, configured to detect whether a current environment is secure; a first repair module 206, configured to respond to current environmental security and directly perform repair on a damaged file system; and a second repair module 208, configured to, in response to that the current environment is not safe, restart the system to enter the BootLoader mode, and then perform repair of the damaged file system.
According to one embodiment of the device of the invention, the first repair module comprises: the file acquisition submodule is used for acquiring a binary file for repairing according to the block number; the first hash value operator module is used for calculating the hash value of the acquired binary file; the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state; the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value; and the file writing submodule is used for writing the acquired binary file into the calculated sector.
According to a further embodiment of the apparatus of the present invention, the second repair module comprises: the restarting submodule is used for restarting the system to enter a BootLoader mode; the file acquisition submodule is used for acquiring a binary file for repairing according to the block number; the first hash value operator module is used for calculating the hash value of the acquired binary file; the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state; the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value; a write file submodule for writing the acquired binary file to the calculated sector; the second hash value operator module is used for calculating the hash value of each block of the file system; the second comparison submodule is used for checking whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state; and the circular repair submodule is used for responding to the fact that the hash value of any block is inconsistent with the corresponding hash value of the factory state, and performing repair processing on the block as same as the damaged block.
The particular features, structures, or characteristics of the various embodiments described herein may be combined as suitable in one or more embodiments of the invention. Additionally, in some cases, the order of steps depicted in the flowcharts and/or in the pipelined process may be modified, as appropriate, and need not be performed exactly in the order depicted. In addition, various aspects of the invention may be implemented using software, hardware, firmware, or a combination thereof, and/or other computer implemented modules or devices that perform the described functions. Software implementations of the present invention may include executable code stored in a computer readable medium and executed by one or more processors. The computer readable medium may include a computer hard drive, ROM, RAM, flash memory, portable computer storage media such as CD-ROM, DVD-ROM, flash drives, and/or other devices, for example, having a Universal Serial Bus (USB) interface, and/or any other suitable tangible or non-transitory computer readable medium or computer memory on which executable code may be stored and executed by a processor. The present invention may be used in conjunction with any suitable operating system.
As used herein, the singular forms "a", "an" and "the" include plural references (i.e., have the meaning "at least one"), unless the context clearly dictates otherwise. It will be further understood that the terms "has," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
The foregoing describes some preferred embodiments of the present invention, but it should be emphasized that the invention is not limited to these embodiments, but can be implemented in other ways within the scope of the inventive subject matter. The present invention may be modified and adapted by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications and adaptations still fall within the scope of the present invention.

Claims (8)

1. A method for file system recovery, the method comprising:
in response to a file system corruption, determining a block number of the corrupted portion;
detecting whether the current environment is safe;
responding to the current environment safety, and directly repairing the damaged file system; and
in response to the current environment being unsafe, the system is restarted to enter a BootLoader mode, and then the damaged file system is repaired;
wherein the directly performing repair of the corrupted file system in response to the current environmental security comprises:
acquiring a binary file for repairing according to the block number;
calculating the hash value of the obtained binary file;
comparing the calculated hash value with the corresponding hash value of the factory state;
responding to the correct calculated hash value, and calculating the sector corresponding to the block number;
writing the obtained binary file to the calculated sector.
2. The method of claim 1, wherein in response to the current environment being unsafe, restarting the system to enter BootLoader mode, and then performing the repair of the damaged file system comprises:
restarting the system to enter a BootLoader mode;
acquiring a binary file for repairing according to the block number;
calculating the hash value of the obtained binary file;
comparing the calculated hash value with the corresponding hash value of the factory state;
responding to the correct calculated hash value, and calculating the sector corresponding to the block number;
writing the obtained binary file to the calculated sector;
calculating hash values of all blocks of the file system;
checking whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state;
and responding to the inconsistency between the hash value of any block and the corresponding hash value in the factory state, and performing the same repairing treatment as the damaged block on the block with the inconsistency in hash value comparison in the file system.
3. The method according to claim 1 or 2, characterized in that the binary file for repair is obtained from a web server, a locally hidden backup area or a local read-only area.
4. The method of claim 3, wherein the locally hidden backup area is hidden by corresponding a start sector of the area of the device not storing the backup file system to sector 0 of the file system.
5. A file system recovery apparatus, the apparatus comprising:
a block number determination module for determining a block number of the corrupted portion in response to the file system corruption;
the environment safety detection module is used for detecting whether the current environment is safe or not;
the first repair module is used for responding to the current environment safety and directly repairing the damaged file system; and
the second repair module is used for responding to the current unsafe environment, restarting the system to enter a BootLoader mode, and then repairing the damaged file system;
wherein the first repair module comprises:
the file acquisition submodule is used for acquiring a binary file for repairing according to the block number;
the first hash value operator module is used for calculating the hash value of the acquired binary file;
the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state;
the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value;
and the file writing submodule is used for writing the acquired binary file into the calculated sector.
6. The apparatus of claim 5, wherein the second repair module comprises:
the restarting submodule is used for restarting the system to enter a BootLoader mode;
the file acquisition submodule is used for acquiring a binary file for repairing according to the block number;
the first hash value operator module is used for calculating the hash value of the acquired binary file;
the first comparison submodule is used for comparing the calculated hash value with the corresponding hash value of the factory state;
the sector calculation submodule is used for calculating the sector corresponding to the block number in response to the correctness of the calculated hash value;
a write file submodule for writing the acquired binary file to the calculated sector;
the second hash value operator module is used for calculating the hash value of each block of the file system;
the second comparison submodule is used for checking whether the hash value of each block of the file system is consistent with the corresponding hash value of the factory state;
and the cyclic repair submodule is used for responding to the inconsistency between the hash value of any block and the corresponding hash value of the factory state, and performing the same repair treatment as the damaged block on the block with the inconsistency in hash value comparison in the file system.
7. The apparatus of claim 5 or 6, wherein the binary file for repair is obtained from a web server, a local hidden backup area, or a local read-only area.
8. The apparatus of claim 7, wherein the locally hidden backup area is hidden by corresponding a start sector of an area of the device that does not store the backup file system to sector 0 of the file system.
CN201711472107.6A 2017-12-29 2017-12-29 File system recovery method and device Active CN108255644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711472107.6A CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711472107.6A CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Publications (2)

Publication Number Publication Date
CN108255644A CN108255644A (en) 2018-07-06
CN108255644B true CN108255644B (en) 2021-12-31

Family

ID=62725030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711472107.6A Active CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Country Status (1)

Country Link
CN (1) CN108255644B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190378A (en) * 2018-09-19 2019-01-11 郑州云海信息技术有限公司 A kind of kernel restoration methods and device
CN111104248A (en) * 2018-10-26 2020-05-05 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for verifying cached files
CN116560957A (en) * 2023-04-21 2023-08-08 珠海云艺网络科技有限公司 Method, system, device and medium for testing damaged document repair result

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
CN104392188A (en) * 2014-11-06 2015-03-04 三星电子(中国)研发中心 Security data storage method and system
CN104598328A (en) * 2015-02-04 2015-05-06 南车株洲电力机车研究所有限公司 File system repair method, device and system
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN105631345A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Multi-domain user file system encryption method and system
US9805068B1 (en) * 2013-08-30 2017-10-31 Veritas Technologies Llc Systems and methods for facilitating features of system recovery environments during restore operations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
US9805068B1 (en) * 2013-08-30 2017-10-31 Veritas Technologies Llc Systems and methods for facilitating features of system recovery environments during restore operations
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN104392188A (en) * 2014-11-06 2015-03-04 三星电子(中国)研发中心 Security data storage method and system
CN104598328A (en) * 2015-02-04 2015-05-06 南车株洲电力机车研究所有限公司 File system repair method, device and system
CN105631345A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Multi-domain user file system encryption method and system

Also Published As

Publication number Publication date
CN108255644A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN106020865B (en) System upgrading method and device
CN106951345B (en) Consistency test method and device for disk data of virtual machine
CN108255644B (en) File system recovery method and device
US11163886B2 (en) Information handling system firmware bit error detection and correction
US8826080B2 (en) Methods and systems for preboot data verification
CN102298545B (en) System startup boot processing method and device
CN106775610B (en) Electronic equipment starting method and electronic equipment
CN106776122A (en) A kind of method of main-apparatus protection in start-up course based on Flash
KR20130033416A (en) Methods and apparatus to protect segments of memory
CN104216800A (en) Automatic system fault recovering method and device based on data redundancy
US20120030766A1 (en) Method and system for defining a safe storage area for use in recovering a computer system
CN104063477A (en) Processing method and processing device for startup abnormalities of embedded system
US11422901B2 (en) Operating system repairs via recovery agents
WO2012031567A1 (en) Fault tolerance method and device for file system
CN104216743A (en) Method and system for maintaining start completeness of configurable virtual machine
WO2019080840A1 (en) Method and device for repairing firmware
CN115793985A (en) Safe storage method, device, equipment and storage medium
WO2020167287A1 (en) Recovery via backups of recovery information
WO2015184732A1 (en) Bootstrap storage method, bootstrap fault recovery method and device, and computer storage medium
US11561788B2 (en) Resilient software updates in secure storage devices
CN114385418A (en) Protection method, device, equipment and storage medium for communication equipment
CN108196975B (en) Data verification method and device based on multiple checksums and storage medium
CN105549985A (en) Method and system for enhancing reliability of Linux application system
CN110727597B (en) Method for checking invalid code completion case based on log
CN111124760B (en) Uboot-based embedded equipment starting method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230516

Address after: Room 401, Floor 4, No. 2, Haidian East Third Street, Haidian District, Beijing 100080

Patentee after: Yuanxin Information Technology Group Co.,Ltd.

Address before: 100176 room 2222, building D, building 33, 99 Kechuang 14th Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Patentee before: YUANXIN TECHNOLOGY

TR01 Transfer of patent right